TCP/IP’s z/OS Encryption Readiness Technology (zERT) feature provides a single source of data to determine which traffic to and from your site is cryptographically protected by protocols like TLS, SSH, and IPSec, and which is not protected.
This video covers:
- What the new IBM zERT feature is
- What data is (and isn’t) collected by zERT
- The value of zERT data for network security administrators
- And a demonstration of navigating zERT data using an interactive, web-based solution
Watch the full recording to learn more about the value provided by zERT and other SMF data: Leveraging zERT and Other SMF Data to Manage and Optimize Network Encryption here.
For more on this topic, please read Cheryl Watson’s Tuning Letter Reprint of Managing Encryption of Network Traffic with IBM zERT.
You May Also Be Interested In:
Performance Analysis Leads to Improved Mainframe Security
Common views across technical silos helps foster effective communication and delivers timely responses to infrastructure and application changes without sacrificing safety.
Leveraging zERT and Other SMF Data to Manage and Optimize Network Encryption | IntelliMagic zAcademy
Given the importance of security in today’s world, managing network encryption is a critical requirement for almost every z/OS environment.
Banco do Brasil Ensures Availability for Billions of Daily Transactions with IntelliMagic Vision
Discover how Banco do Brasil enhanced its performance and capacity management with IntelliMagic Vision, proactively avoiding disruptions and improving cross-team collaboration.